tun: linux: do not spam events every second from hack listener

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
Jason A. Donenfeld 2021-03-11 09:23:11 -07:00
parent 6005c573e2
commit c5f382624e

View file

@ -55,6 +55,11 @@ func (tun *NativeTun) routineHackListener() {
/* This is needed for the detection to work across network namespaces /* This is needed for the detection to work across network namespaces
* If you are reading this and know a better method, please get in touch. * If you are reading this and know a better method, please get in touch.
*/ */
last := 0
const (
up = 1
down = 2
)
for { for {
sysconn, err := tun.tunFile.SyscallConn() sysconn, err := tun.tunFile.SyscallConn()
if err != nil { if err != nil {
@ -68,13 +73,19 @@ func (tun *NativeTun) routineHackListener() {
} }
switch err { switch err {
case unix.EINVAL: case unix.EINVAL:
// If the tunnel is up, it reports that write() is if last != up {
// allowed but we provided invalid data. // If the tunnel is up, it reports that write() is
tun.events <- EventUp // allowed but we provided invalid data.
tun.events <- EventUp
last = up
}
case unix.EIO: case unix.EIO:
// If the tunnel is down, it reports that no I/O if last != down {
// is possible, without checking our provided data. // If the tunnel is down, it reports that no I/O
tun.events <- EventDown // is possible, without checking our provided data.
tun.events <- EventDown
last = down
}
default: default:
return return
} }